Skip to content

Commit 554ea22

Browse files
committed
Fix merge errors
1 parent dbfc7f2 commit 554ea22

File tree

10 files changed

+24
-26
lines changed

10 files changed

+24
-26
lines changed

engine/storage/datamotion/src/main/java/org/apache/cloudstack/storage/motion/StorageSystemDataMotionStrategy.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -2171,11 +2171,11 @@ private MigrationOptions.Type decideMigrationTypeAndCopyTemplateIfNeeded(Host de
21712171
srcVolumeInfo.getTemplateId() != null &&
21722172
Objects.nonNull(vmTemplate) &&
21732173
!Arrays.asList(KVM_VM_IMPORT_DEFAULT_TEMPLATE_NAME, VM_IMPORT_DEFAULT_TEMPLATE_NAME).contains(vmTemplate.getName())) {
2174-
LOGGER.debug(String.format("Copying template [%s] of volume [%s] from source storage pool [%s] to target storage pool [%s].", srcVolumeInfo.getTemplateId(), srcVolumeInfo.getId(), sourceStoragePool.getId(), destStoragePool.getId()));
2174+
logger.debug(String.format("Copying template [%s] of volume [%s] from source storage pool [%s] to target storage pool [%s].", srcVolumeInfo.getTemplateId(), srcVolumeInfo.getId(), sourceStoragePool.getId(), destStoragePool.getId()));
21752175
copyTemplateToTargetFilesystemStorageIfNeeded(srcVolumeInfo, sourceStoragePool, destDataStore, destStoragePool, destHost);
21762176
return MigrationOptions.Type.LinkedClone;
21772177
}
2178-
LOGGER.debug(String.format("Skipping copy template from source storage pool [%s] to target storage pool [%s] before migration due to volume [%s] does not have a " +
2178+
logger.debug(String.format("Skipping copy template from source storage pool [%s] to target storage pool [%s] before migration due to volume [%s] does not have a " +
21792179
"template or we are doing full clone migration.", sourceStoragePool.getId(), destStoragePool.getId(), srcVolumeInfo.getId()));
21802180
return MigrationOptions.Type.FullClone;
21812181
}

plugins/storage/object/ceph/src/main/java/org/apache/cloudstack/storage/datastore/driver/CephObjectStoreDriverImpl.java

+5-8
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,6 @@
4646
import org.apache.cloudstack.storage.datastore.db.ObjectStoreVO;
4747
import org.apache.cloudstack.storage.object.BaseObjectStoreDriverImpl;
4848
import org.apache.cloudstack.storage.object.BucketObject;
49-
import org.apache.logging.log4j.LogManager;
50-
import org.apache.logging.log4j.Logger;
5149
import org.twonote.rgwadmin4j.RgwAdmin;
5250
import org.twonote.rgwadmin4j.RgwAdminBuilder;
5351
import org.twonote.rgwadmin4j.model.BucketInfo;
@@ -62,7 +60,6 @@
6260
import java.util.HashMap;
6361

6462
public class CephObjectStoreDriverImpl extends BaseObjectStoreDriverImpl {
65-
private static final Logger s_logger = LogManager.getLogger(CephObjectStoreDriverImpl.class);
6663

6764
@Inject
6865
AccountDao _accountDao;
@@ -168,7 +165,7 @@ public void setBucketPolicy(BucketTO bucket, String policy, long storeId) {
168165
String policyConfig;
169166

170167
if (policy.equalsIgnoreCase("public")) {
171-
s_logger.debug("Setting public policy on bucket " + bucket.getName());
168+
logger.debug("Setting public policy on bucket " + bucket.getName());
172169
StringBuilder builder = new StringBuilder();
173170
builder.append("{\n");
174171
builder.append(" \"Statement\": [\n");
@@ -192,7 +189,7 @@ public void setBucketPolicy(BucketTO bucket, String policy, long storeId) {
192189
builder.append("}\n");
193190
policyConfig = builder.toString();
194191
} else {
195-
s_logger.debug("Setting private policy on bucket " + bucket.getName());
192+
logger.debug("Setting private policy on bucket " + bucket.getName());
196193
policyConfig = "{\"Version\":\"2012-10-17\",\"Statement\":[]}";
197194
}
198195

@@ -218,15 +215,15 @@ public boolean createUser(long accountId, long storeId) {
218215
RgwAdmin rgwAdmin = getRgwAdminClient(storeId);
219216
String username = account.getUuid();
220217

221-
s_logger.debug("Attempting to create Ceph RGW user for account " + account.getAccountName() + " with UUID " + username);
218+
logger.debug("Attempting to create Ceph RGW user for account " + account.getAccountName() + " with UUID " + username);
222219
try {
223220
Optional<User> user = rgwAdmin.getUserInfo(username);
224221
if (user.isPresent()) {
225-
s_logger.info("User already exists in Ceph RGW: " + username);
222+
logger.info("User already exists in Ceph RGW: " + username);
226223
return true;
227224
}
228225
} catch (Exception e) {
229-
s_logger.debug("User does not exist. Creating user in Ceph RGW: " + username);
226+
logger.debug("User does not exist. Creating user in Ceph RGW: " + username);
230227
}
231228

232229
try {

plugins/storage/object/ceph/src/main/java/org/apache/cloudstack/storage/datastore/lifecycle/CephObjectStoreLifeCycleImpl.java

+5-5
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939

4040
public class CephObjectStoreLifeCycleImpl implements ObjectStoreLifeCycle {
4141

42-
private static final Logger s_logger = LogManager.getLogger(CephObjectStoreLifeCycleImpl.class);
42+
private Logger logger = LogManager.getLogger(CephObjectStoreLifeCycleImpl.class);
4343

4444
@Inject
4545
ObjectStoreHelper objectStoreHelper;
@@ -72,7 +72,7 @@ public DataStore initialize(Map<String, Object> dsInfos) {
7272
objectStoreParameters.put("accesskey", accessKey);
7373
objectStoreParameters.put("secretkey", secretKey);
7474

75-
s_logger.info("Attempting to connect to Ceph RGW at " + url + " with access key " + accessKey);
75+
logger.info("Attempting to connect to Ceph RGW at " + url + " with access key " + accessKey);
7676

7777
RgwAdmin rgwAdmin = new RgwAdminBuilder()
7878
.accessKey(accessKey)
@@ -81,10 +81,10 @@ public DataStore initialize(Map<String, Object> dsInfos) {
8181
.build();
8282
try {
8383
List<String> buckets = rgwAdmin.listBucket();
84-
s_logger.debug("Found " + buckets + " buckets at Ceph RGW: " + url);
85-
s_logger.info("Successfully connected to Ceph RGW: " + url);
84+
logger.debug("Found " + buckets + " buckets at Ceph RGW: " + url);
85+
logger.info("Successfully connected to Ceph RGW: " + url);
8686
} catch (Exception e) {
87-
s_logger.debug("Error while initializing Ceph RGW Object Store: " + e.getMessage());
87+
logger.debug("Error while initializing Ceph RGW Object Store: " + e.getMessage());
8888
throw new RuntimeException("Error while initializing Ceph RGW Object Store. Invalid credentials or URL");
8989
}
9090

plugins/user-authenticators/saml2/src/main/java/org/apache/cloudstack/saml/SAMLUtils.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ public static void setupSamlUserCookies(final LoginCmdResponse loginResponse, fi
319319
}
320320
String sameSite = ApiServlet.getApiSessionKeySameSite();
321321
String sessionKeyCookie = String.format("%s=%s;Domain=%s;Path=%s;%s", ApiConstants.SESSIONKEY, loginResponse.getSessionKey(), domain, path, sameSite);
322-
s_logger.debug("Adding sessionkey cookie to response: " + sessionKeyCookie);
322+
LOGGER.debug("Adding sessionkey cookie to response: " + sessionKeyCookie);
323323
resp.addHeader("SET-COOKIE", sessionKeyCookie);
324324
}
325325

server/src/main/java/com/cloud/api/dispatch/ParamProcessWorker.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -310,7 +310,7 @@ public void processParameters(final BaseCmd cmd, final Map params) {
310310
doAccessChecks(cmd, entitiesToAccess);
311311
}
312312

313-
private void doAccessChecks(BaseCmd cmd, Map<Object, AccessType> entitiesToAccess) {
313+
protected void doAccessChecks(BaseCmd cmd, Map<Object, AccessType> entitiesToAccess) {
314314
Account caller = CallContext.current().getCallingAccount();
315315
List<Long> entityOwners = cmd.getEntityOwnerIds();
316316
Account[] owners = null;

server/src/main/java/com/cloud/user/AccountManagerImpl.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -749,9 +749,9 @@ public void validateAccountHasAccessToResource(Account account, AccessType acces
749749
} else if (Domain.class.isAssignableFrom(resourceClass)) {
750750
checkAccess(account, (Domain) resource);
751751
} else if (InfrastructureEntity.class.isAssignableFrom(resourceClass)) {
752-
s_logger.trace("Validation of access to infrastructure entity has been disabled in CloudStack version 4.4.");
752+
logger.trace("Validation of access to infrastructure entity has been disabled in CloudStack version 4.4.");
753753
}
754-
s_logger.debug(String.format("Account [%s] has access to resource.", account.getUuid()));
754+
logger.debug(String.format("Account [%s] has access to resource.", account.getUuid()));
755755
}
756756

757757
@Override

server/src/test/java/com/cloud/api/dispatch/ParamProcessWorkerTest.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ public void processVmHostNameParameter_NotMoreThan63Chars() {
174174

175175
@Test
176176
public void doAccessChecksTestChecksCallerAccessToOwnerWhenCmdExtendsBaseAsyncCreateCmd() {
177-
Mockito.doReturn(owners).when(paramProcessWorkerSpy).getEntityOwners(Mockito.any());
177+
Mockito.lenient().doReturn(owners).when(paramProcessWorkerSpy).getEntityOwners(Mockito.any());
178178
Mockito.doNothing().when(paramProcessWorkerSpy).checkCallerAccessToEntities(Mockito.any(), Mockito.any(), Mockito.any());
179179

180180
paramProcessWorkerSpy.doAccessChecks(new AssociateIPAddrCmd(), entities);
@@ -184,7 +184,7 @@ public void doAccessChecksTestChecksCallerAccessToOwnerWhenCmdExtendsBaseAsyncCr
184184

185185
@Test
186186
public void doAccessChecksTestChecksCallerAccessToEntities() {
187-
Mockito.doReturn(owners).when(paramProcessWorkerSpy).getEntityOwners(Mockito.any());
187+
Mockito.lenient().doReturn(owners).when(paramProcessWorkerSpy).getEntityOwners(Mockito.any());
188188
Mockito.doNothing().when(paramProcessWorkerSpy).checkCallerAccessToEntities(Mockito.any(), Mockito.any(), Mockito.any());
189189

190190
paramProcessWorkerSpy.doAccessChecks(new AssociateIPAddrCmd(), entities);

services/secondary-storage/server/src/main/java/org/apache/cloudstack/storage/formatinspector/Qcow2Inspector.java

+3-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@
1919

2020
import com.cloud.utils.NumbersUtil;
2121
import org.apache.commons.lang3.ArrayUtils;
22-
import org.apache.log4j.Logger;
22+
import org.apache.logging.log4j.LogManager;
23+
import org.apache.logging.log4j.Logger;
2324

2425
import java.io.FileInputStream;
2526
import java.io.IOException;
@@ -42,7 +43,7 @@
4243
* and on the <a href="https://review.opendev.org/c/openstack/cinder/+/923247/2/cinder/image/format_inspector.py">OpenStack's Cinder implementation for Python</a>.
4344
*/
4445
public class Qcow2Inspector {
45-
protected static Logger LOGGER = Logger.getLogger(Qcow2Inspector.class);
46+
protected static Logger LOGGER = LogManager.getLogger(Qcow2Inspector.class);
4647

4748
private static final byte[] QCOW_MAGIC_STRING = ArrayUtils.add("QFI".getBytes(), (byte) 0xfb);
4849
private static final int INCOMPATIBLE_FEATURES_MAX_KNOWN_BIT = 4;

services/secondary-storage/server/src/main/java/org/apache/cloudstack/storage/resource/NfsSecondaryStorageResource.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -3489,7 +3489,7 @@ public String postUpload(String uuid, String filename, long processTimeout) {
34893489
try {
34903490
Qcow2Inspector.validateQcow2File(finalFilename);
34913491
} catch (RuntimeException e) {
3492-
s_logger.error(String.format("Uploaded file [%s] is not a valid QCOW2.", finalFilename), e);
3492+
logger.error(String.format("Uploaded file [%s] is not a valid QCOW2.", finalFilename), e);
34933493
return "The uploaded file is not a valid QCOW2. Ask the administrator to check the logs for more details.";
34943494
}
34953495
}

utils/src/main/java/com/cloud/utils/HttpUtils.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -119,12 +119,12 @@ public static boolean validateSessionKey(final HttpSession session, final Map<St
119119
final String jsessionidFromCookie = HttpUtils.findCookie(cookies, "JSESSIONID");
120120
if (jsessionidFromCookie == null
121121
|| !(jsessionidFromCookie.startsWith(session.getId() + '.'))) {
122-
s_logger.error("JSESSIONID from cookie is invalid.");
122+
LOGGER.error("JSESSIONID from cookie is invalid.");
123123
return false;
124124
}
125125
final String sessionKey = (String) session.getAttribute(sessionKeyString);
126126
if (sessionKey == null) {
127-
s_logger.error("sessionkey attribute of the session is null.");
127+
LOGGER.error("sessionkey attribute of the session is null.");
128128
return false;
129129
}
130130
final String sessionKeyFromCookie = HttpUtils.findCookie(cookies, sessionKeyString);

0 commit comments

Comments
 (0)